CVE-2026-46333 (SSH-keygen-pwn)

ethanplant1 pts0 comments

NVD - CVE-2026-46333

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Information Technology Laboratory

National Vulnerability Database

National Vulnerability Database

NVD

Vulnerabilities

CVE-2026-46333<br>Detail

Received

This CVE record has recently been published to the CVE List and has been included within the NVD dataset.

Description

In the Linux kernel, the following vulnerability has been resolved:

ptrace: slightly saner 'get_dumpable()' logic

The 'dumpability' of a task is fundamentally about the memory image of<br>the task - the concept comes from whether it can core dump or not - and<br>makes no sense when you don't have an associated mm.

And almost all users do in fact use it only for the case where the task<br>has a mm pointer.

But we have one odd special case: ptrace_may_access() uses 'dumpable' to<br>check various other things entirely independently of the MM (typically<br>explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for<br>threads that no longer have a VM (and maybe never did, like most kernel<br>threads).

It's not what this flag was designed for, but it is what it is.

The ptrace code does check that the uid/gid matches, so you do have to<br>be uid-0 to see kernel thread details, but this means that the<br>traditional "drop capabilities" model doesn't make any difference for<br>this all.

Make it all make a *bit* more sense by saying that if you don't have a<br>MM pointer, we'll use a cached "last dumpability" flag if the thread<br>ever had a MM (it will be zero for kernel threads since it is never<br>set), and require a proper CAP_SYS_PTRACE capability to override.

Metrics

&ensp;

CVSS Version 4.0

CVSS Version 3.x

CVSS Version 2.0

NVD enrichment efforts reference publicly available information to associate<br>vector strings. CVSS information contributed by other sources is also<br>displayed.

CVSS 4.0 Severity and Vector Strings:

NIST: NVD

N/A

NVD assessment<br>not yet provided.

CVSS 3.x Severity and Vector Strings:

NIST: NVD

Base<br>Score: N/A

NVD assessment<br>not yet provided.

-->

-->

CVSS 2.0 Severity and Vector Strings:

NIST: NVD

Base<br>Score: N/A

NVD assessment<br>not yet provided.

-->

-->

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace.<br>We have provided these links to other web sites because they<br>may have information that would be of interest to you. No<br>inferences should be drawn on account of other sites being<br>referenced, or not, from this page. There may be other web<br>sites that are more appropriate for your purpose. NIST does<br>not necessarily endorse the views expressed, or concur with<br>the facts presented on these sites. Further, NIST does not<br>endorse any commercial products that may be mentioned on<br>these sites. Please address comments about this page to [email protected].

URL<br>Source(s)<br>Tag(s)

http://www.openwall.com/lists/oss-security/2026/05/15/9

CVE

https://git.kernel.org/stable/c/01363cb3fbd0238ffdeb09f53e9039c9edf8a730

kernel.org

https://git.kernel.org/stable/c/15b828a46f305ae9f05a7c16914b3ce273474205

kernel.org

https://git.kernel.org/stable/c/2a93a4fac7b6051d3be7cd1b015fe7320cd0404d

kernel.org

https://git.kernel.org/stable/c/4709234fd1b95136ceb789f639b1e7ea5de1b181

kernel.org

https://git.kernel.org/stable/c/6e5b51e74a40d377bcd3081dd33fbaa0e1aa7e3d

kernel.org

https://git.kernel.org/stable/c/8f907d345bae8f4b3f004c5abc56bf2dfb851ea7

kernel.org

https://git.kernel.org/stable/c/93d4ba49d18e3d7fb41a9927c2d0cca5e9dfefd6

kernel.org

Weakness Enumeration

CWE-ID<br>CWE Name<br>Source

Change History

2 change records found show changes

CVE Modified by CVE 5/15/2026 4:16:49 PM

Action<br>Type<br>Old Value<br>New Value

Added<br>Reference

http://www.openwall.com/lists/oss-security/2026/05/15/9

New CVE Received from kernel.org 5/15/2026 10:16:35 AM

Action<br>Type<br>Old Value<br>New Value

Added<br>Description

In the Linux kernel, the following vulnerability has been resolved:

ptrace: slightly saner 'get_dumpable()' logic

The 'dumpability' of a task is fundamentally about the memory image of<br>the task - the concept comes from whether it can core dump or not - and<br>makes no sense when you don't have an associated mm.

And almost all users do in fact use it only for the case where the task<br>has a mm pointer.

But we have one odd special case: ptrace_may_access() uses 'dumpable' to<br>check various other things entirely independently of the MM (typically<br>explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for<br>threads that no longer have a VM (and maybe never did, like most kernel<br>threads).

It's not what this flag was designed for, but it is what it is.

The ptrace code does check that the uid/gid matches, so you do have to<br>be uid-0 to see kernel thread details, but this means that the<br>traditional "drop...

kernel https cvss stable task nist

Related Articles